SECURITY EQUIPMENT
Homework Task
1. Read Potts et.al Network security Ch 3 pp 108-110 and Ch 8 Security Equipment pp231-242. Complete questions p117 Network Security and p 256 Security Equipment
2. Make sure you update your glossary you should have an understanding of all the words below.
3. You will become an expert in one of these areas. We will discuss and allocate this before end of term. You need to produce a PowerPoint presentation summarising your area after you have done research. Some resources have been provided but you need to come up with at least 2 other resources.This will be presented first day next term.
This is part of Unit 4 SAC 2.
Other resources
http://www.sans.org/reading_room/


Equipment
Text Resources
Other Resources
Possible Questions
Student
Biometrics
Biometrics.pptx
Potts et. al Ch 8 pp 231-232
http://www.biometrics.org/research-resources.php

Fingerprint articleshttp://www.time.com/time/business/article/0,8599,1665119,00.html?imw=Y

http://www.theage.com.au/news/national/schools-to-fingerprint-students-for-security/2007/09/01/1188067438565.html
http://www.theage.com.au/articles/2003/05/06/1051987684696.html

http://www.wired.com/science/discoveries/news/2003/10/61010

Face recognition software
http://download.cnet.com/FaceMetrix/3000-2653_4-10507991.html?tag=lst-0-3
Biometrics refers to the automatic identification of a person based on certain physiological or behavioural characteristics.
They are input devices which require hardware and software.

Give some examples of biometric devices that have been developed and how they are used to secure data.

Rachel
Digital Signatures, Swipe Cards, Smart Cards, Security Tokens

Potts et. al Ch 8 pp 232-233
http://www.idtec.com.au/wawcs0141632/ln-data-collection.html?gclid=COi_1pb9j5sCFYItpAod60aPoA

http://money.howstuffworks.com/personal-finance/debt-management/magnetic-stripe-credit-card.htm

http://money.howstuffworks.com/personal-finance/debt-management/credit-card.htm

Digital Signatures
http://computer.howstuffworks.com/digital-signature.htm
Explain what a digital signature is and how it works.

Explain how these technologies work.

Piyumi
Backup Media
Online BackUp

Potts et. al Ch 8 pp 234-236
http://www.australianit.news.com.au/story/0,24897,22512869-5013037,00.html

Online/Remote backup

http://www.remotebackup.com.au/
Give examples of magnetic, optical and steady state storage devices.
What type of backup hardware would you use to backup:

q Your school assignment
q Your home computer
q File server of a small organisation
q File server of a large organisation
What is remote backup? (or on-line backup)

Danielle
Surveillance
Potts et. al Ch 8 pp 237-239
http://computer.howstuffworks.com/workplace-surveillance.htm

http://www.abc.net.au/science/slab/security/default.htm

http://science.nasa.gov/headlines/y2003/26mar_visar.htm

http://en.wikipedia.org/wiki/Packet_sniffing
What are the following
· Desktop monitoring programs (Observe what we have at school)
· Log files
· Closed-circuit TV
· Telephone monitoring
· Audit trails
How does surveillance work in the workplace?

Rebecca
Physical Security Devices(*)
Potts et. al Ch 8 pp 239


Justine
Power protection and avoiding system failure
  • surge protection
  • UPS
  • multiple hard drives
  • mirror server
  • RAID
  • Online backups
Potts et. al Ch 8 pp 233-234

Potts et. al Ch 8 pp 236-237
Online backup
http://www.f-secure.com/en_EMEA/

http://en.wikipedia.org/wiki/Remote_backup_service

Thao
Encryption software
  • public key
  • private key
Potts et. al Ch 3 pp 109-110
Potts et. al Ch 8 pp 236-237
http://computer.howstuffworks.com/encryption.htm
Encryption is the action of encoding or “scrambling” information so that it is no longer easily readable.
Symmetric encryption-relies on both sender and receiver of message knowing the key.
Asymmetric or public key encryption-uses different keys to encrypt and decrypt. Users are given a public key to encrypt and a private key used to decrypt the message.

How does encryption software work?
What is Symmetric encryption? How does it work?
What is Public key encryption? How does it work?

Alex
Malware
  • anti-virus software
  • spyware and adware protection
Potts et. al Ch 3 pp 109
Potts et. al Ch 8 pp 236-237
http://www.sophos.com/security/
http://us.trendmicro.com/us/home/
http://www.mcafee.com/us/
http://vmyths.com/
How do trojans, email viruses and worms work?
Give some examples of each?
What's difference between antivrus and spyware?
What is a hoax? spam?Phishing?
Leisha Millanta
Firewall (can be hardware and software) (*)
Potts et. al Ch 3 pp 109
Potts et. al Ch 8 pp 242
http://computer.howstuffworks.com/firewall.htm

http://en.wikipedia.org/wiki/Firewalls
What is a firewall?
Use a diagram to help explain how firewalls work?
Give some examples of firewalls on the market.

Justine
Network software (*)
  • password protection
  • policies and profiles
Potts et. al Ch 3 pp 108
Potts et. al Ch 8 pp 241


Justine